Sciweavers

3556 search results - page 100 / 712
» Can machine learning be secure
Sort
View
ML
2002
ACM
220views Machine Learning» more  ML 2002»
13 years 10 months ago
Bayesian Methods for Support Vector Machines: Evidence and Predictive Class Probabilities
I describe a framework for interpreting Support Vector Machines (SVMs) as maximum a posteriori (MAP) solutions to inference problems with Gaussian Process priors. This probabilisti...
Peter Sollich
NDSS
2007
IEEE
14 years 4 months ago
Fig: Automatic Fingerprint Generation
Fingerprinting is a widely used technique among the networking and security communities for identifying different implementations of the same piece of networking software running ...
Shobha Venkataraman, Juan Caballero, Pongsin Poosa...
ICML
2009
IEEE
14 years 11 months ago
Optimal reverse prediction: a unified perspective on supervised, unsupervised and semi-supervised learning
Training principles for unsupervised learning are often derived from motivations that appear to be independent of supervised learning. In this paper we present a simple unificatio...
Linli Xu, Martha White, Dale Schuurmans
ICML
2006
IEEE
14 years 11 months ago
Autonomous shaping: knowledge transfer in reinforcement learning
We introduce the use of learned shaping rewards in reinforcement learning tasks, where an agent uses prior experience on a sequence of tasks to learn a portable predictor that est...
George Konidaris, Andrew G. Barto
GECCO
2009
Springer
161views Optimization» more  GECCO 2009»
14 years 4 months ago
Are evolutionary rule learning algorithms appropriate for malware detection?
In this paper, we evaluate the performance of ten well-known evolutionary and non-evolutionary rule learning algorithms. The comparative study is performed on a real-world classiï...
M. Zubair Shafiq, S. Momina Tabish, Muddassar Faro...